You are on page 1of 2
@ PERSUASIVE TEXTS — Sd ee ¥ sage on te Gas ries) toy Brame Ge MANS PERSUASIVE TECHNIQUES - A SPEECH MToe ye AGAR “OWS ACCOUG, Below is an example of a persuasive text (speech). Examples of common persuasive techniques are highlighted and explained. Er ACE From. pucgets, Read the text, taking note of how the writer has used these techniques. 8 Spe thas Clore ed mein We introduction : includes greeting How we can prevent cyber-bullying? of dignitaries in : _ introduction order of position, } hx Good afternoon Ms President, Parents and Citizens | | inoduction then the general Association members, ladies and gentlemen. My, —| speaker's name audience name is Lakshmi Rajneesh, and Lam a Year 7 student here at Mount Verdant High School. Today Iwill be \ddressing the issue of how we can implement some ‘introduction first-person, present |_| ™ B 7 : ee { simple strategies to help prevent eyber-bullying. “x fx] includes a summary | + | of the issue gensrasnanis 08 RRA 7 ARSE presentation helps yee oa Cyber-bullying isan ever-increasing problem faced By many people in Australia today. My research shows =| that 75 per cent of Year 7 students across Australia statistics add a cujrens have been targeted by cyber-bullies, Fortunately, sense of authority**p=r9° there are a number of strategies we can use to ensure am aneeee | , that cyber-bullies don't succeed in their efforts in this school, I'd now like to share some of those ideas with | _{ the word share ‘you, so that your families and friends can help prevent \\_| implies a joint effort, specific reference to this context adds _| a sense of purpose this problem. grees | puhich helps get the ‘woos’ | | audience on side ‘To disarm cyber-bullies, make sure you don't give second-person mode) | them any ammunition against you or your friends. the imperative sta a 7 of presentation is ‘This means that you should never write, send or (active) voice adds used to address the publish anything that could be used asa weapon to immediacy and audience embarrass, threaten or discredit you. This includes makes the speech written messages, photos, video and audio recordings. more concise A simple rule to remember is not to say or share anything about other people that you wouldn't be prepared to say to them or show them in person. Better still, if you make a comment about someone else, try to make sure that itis positive. Irs never a good idea to bad-mouth others. emotive and re descriptive terms Another simple strategy is to ensure that you never dkctebeh contrast and irony create a role reversal send mean, threatening, angry, abusive or obscene + _| | chaviour seem : messages to anyone. Iti all too easy to fight back with | ~> undesirable and ualy ‘technique to the d inet: ‘~ but all this d + Pee ovtatea point] pat2e same weapons used against you ~ butall this does is ‘turn you into the bully. Dor't play into the real bullies’ hands by letting your anger get the better of you. 8 Persuasive texts work sheets (Secondary) ISBN 978-1-921680-50-2 © Blake Education, 2010 @ PERSUASIVE TEXTS PERSUASIVE TECHNIQUES — A SPEECH, CONT. key points may be anecdotal (personally referred to by number |_| ~~ _| experienced) (first, second...) to evidence is presented| help organise the : to help justify the sdeas more clearly class is to inform authorities about cyber-bullying as valiaty of th soon as it happens. If you ora person you know is being | | strategy [-” bullied online, tell someone aboutit. Only a coward wouldn’t take this critical step. A bully’s power is. ~~} statemen undermined when their secret activities are exposed ieee aia for everyone to see. This also shows them that you eeu cannot be intimidated into keeping quiet. There are erngkional nerpaiee many people out there who can help, including your and provoke action parents, teachers, friends and the families of the bullies themselves. Ly A third idea that has proven very successful in our ~~] Fighting cyber-bullies can also occur at home. Some simple rules can be put into place within your own families. Parents’ expectations about their kids’ online behaviour should be made clear before Internet access is provided at home. Parents can place computers in less private areas of the house, so they can monitor any online interactions from a respectful distance. Its important to consider that cyber-bullies aren't all that different from old-fashioned bullies. Many are crying out for attention and care, So we must offer them | (the key point help, care and concern. A bully may be facing emotional |_| about informing problems that cause this behaviour. Speaking out about | | is recalled later in cyber-bullying can assist the bullies themselves, not | the speech to help just their victims. reinforce the ideas Although cyber-bullying has been made possible through hi-tech telecommunications machinery, concluding statement {| summarises and a powerful ending it can really only be prevented by people. Good Teinforces the Statement thatis | | | friendships, genuine care for others and open point of view being ply worded, yet communication are our best defences. presented using memorable ‘Thank you for your attention. contrast sss Persuasive texts work sheets (Secondary) ISBN 978-1-921680-50-2 © Blake Education, 2010

You might also like